Answer:
Creation/application of technology to deliver goods/services with little human effort.
Explanation:
For example, manufacturing technology produces products without much need of human intervention.
Since you aren't sure that all recipients have access to Microsoft Word, you should save the file by using the "Save as" command.
<h3>What is Microsoft Word?</h3>
Microsoft Word can be defined as a word-processing software program that is designed and developed by Microsoft Inc., so as to avail its end users an ability to type, format, adjust and save text-based documents or files.
<h3>What is a file?</h3>
A file can be defined as a computer resource or type of document that avails an end user the ability to save or record data as a single unit on a computer storage device.
In this scenario, we can infer and logically deduce that you should save the file by using the "Save as" command because you aren't sure that all recipients have access to Microsoft Word.
Read more on Microsoft Word here: brainly.com/question/25813601
#SPJ1
Answer:
B. Install in Safe Mode.
Explanation:
Since Jennifer is using the administrator account, she should be able to install the program.
Hence, she should install the anti-malware software in Safe Mode.
In Computer science, Safe Mode is a mode in which the operating system loads only the bare minimum services, process and programs to boot or start up.
Hence, Safe Mode will ensure that when Jennifer is installing the anti-malware software, no other program or service is running which may interfere with her installation.
1. strengths, weakness, opportunities, threats
2. protecting the privacy of others
3. this behavior can create divisions on the team.
4. creating a schedule for workflow
Answer:
c. a group of compromised computers connected to a network that attacks other networks
Explanation:
<em>Botnets </em>refer to a group of computers controlled from a single source in which software programs are run. Botnets can be used for several purposes, such as scientific (SETI), or computing corporate purposes; on the other hand, botnets are also used for illegal purposes, for instance hacker run malicious programs in order to attack other networks.